• Title/Summary/Keyword: theoretical information security engineering

Search Result 44, Processing Time 0.031 seconds

Secrecy Analysis of Amplify-and-Forward Relay Networks with Beamforming

  • Chen, Pu;Ouyang, Jian;Zhu, Wei-Ping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.5049-5062
    • /
    • 2016
  • This paper analyzes the secrecy performance of an amplify-and-forward (AF) relay network, where a multi-antenna eavesdropper attempts to overhear the transmitted message from a multi-antenna source to a multi-antenna destination with a single antenna relay. Firstly, we derive the approximate analytical expressions for the secrecy outage probability (SOP) and average secrecy rate (ASR) of the relay network. Then, asymptotic expressions of SOP and ASR at high main-to-eavesdropper ratio (MER) are also provided to reveal the diversity gain of the secure communication. Finally, numerical results are given to verify the theoretical analysis and show the effect of the number of antennas in the considered relay network.

Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking

  • Wang, Kai;Bao, Wei;Wang, Yingjie;Tong, Xiangrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4641-4657
    • /
    • 2017
  • Named Data Networking (NDN) has emerged and become one of the most promising architectures for future Internet. However, like traditional IP-based networking paradigm, NDN may not evade some typical network threats such as malicious data aggregates (MDA), which may lead to bandwidth exhaustion, traffic congestion and router overload. This paper firstly analyzes the damage effect of MDA using realistic simulations in large-scale network topology, showing that it is not just theoretical, and then designs a fine-grained MDA mitigation mechanism (MDAM) based on the cooperation between routers via alert messages. Simulations results show that MDAM can significantly reduce the Pending Interest Table overload in involved routers, and bring in normal data-returning rate and data-retrieval delay.

Simulation Study on Measuring Pulverized Coal Concentration in Power Plant Boiler

  • Chen, Lijun;Wang, Yang;Su, Cheng
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.189-202
    • /
    • 2019
  • During thermal power coal-fired boiler operation, it is very important to detect the pulverized coal concentration in the air pipeline for the boiler combustion stability and economic security. Because the current measurement methods used by power plants are often involved with large measurement errors and unable to monitor the pulverized coal concentration in real-time, a new method is needed. In this paper, a new method based on microwave circular waveguide is presented. High Frequency Electromagnetic Simulation (HFSS) software was used to construct a simulation model for measuring pulverized coal concentration in power plant pipeline. Theoretical analysis and simulation experiments were done to find the effective microwave emission frequency, installation angle, the type of antenna probe, antenna installation distance and other important parameters. Finally, field experiment in Jilin Thermal Power Plant proved that with selected parameters, the measuring device accurately reflected the changes in the concentration of pulverized coal.

Features of the Use of Computer Telecommunications In Education: Development Prospects

  • Honcharuk, Vitalii;Sherman, Mykhailo;Tumasov, Serhii;Shevchuk, Oleksii;Yeremenko, Liliia;Zaporozhchenko, Vitalii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.213-217
    • /
    • 2022
  • In the article, in connection with the goal and the hypothesis put forward, the following tasks were formulated: Based on the analysis of literature and existing pedagogical experience, the possibilities, features and pedagogical conditions for the use of educational telecommunication projects were specified. The selection of topics and content of educational telecommunication projects for use has been carried out. Research methods: theoretical analysis of psychological, pedagogical and methodological literature, projects of educational standards in computer science and information technology, study of the state of the problem in teaching practice, questioning.

The Future of Quantum Information: Challenges and Vision

  • Kim, Dohyun;Kang, Jungho;Kim, Tae Woo;Pan, Yi;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.151-162
    • /
    • 2021
  • Quantum information has passed the theoretical research period and has entered the realization step for its application to the information and communications technology (ICT) sector. Currently, quantum information has the advantage of being safer and faster than conventional digital computers. Thus, a lot of research is being done. The amount of big data that one needs to deal with is expected to grow exponentially. It is also a new business model that can change the landscape of the existing computing. Just as the IT sector has faced many challenges in the past, we need to be prepared for change brought about by Quantum. We would like to look at studies on quantum communication, quantum sensing, and quantum computing based on quantum information and see the technology levels of each country and company. Based on this, we present the vision and challenge for quantum information in the future. Our work is significant since the time for first-time study challengers is reduced by discussing the fundamentals of quantum information and summarizing the current situation.

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

  • Ning, Lina;Li, Bin;Wang, Xiang;Liu, Xiaoming;Zhao, Chenglin
    • ETRI Journal
    • /
    • v.43 no.5
    • /
    • pp.941-949
    • /
    • 2021
  • In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input multiple-output systems. First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum. When the PSA occurs, the transmitter (That is Alice) can detect either one or two spatial spectrum peaks. Then, the legitimate user (That is Bob) and Eve are recognized in the downlink stage via the channel reciprocity property based on the difference between the spatial spectra if PSA occurs. This way, the presence of Eve and the direction of arrival of Eve and Bob can be identified at the transmitter end. Because noise is suppressed by a spatial spectrum, the detection performance is reliable even for low signal-noise ratios and a short training length. Consequently, Bob can use beamforming to transmit secure information during the data transmission stage. Theoretical analysis and numerical simulations are performed to evaluate the performance of the proposed scheme compared with conventional methods.

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI

  • XU, Yunjia;HUANG, Kaizhi;HU, Xin;ZOU, Yi;CHEN, Yajun;JIANG, Wenyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.110-132
    • /
    • 2019
  • To ensure reliable and secure communication in heterogeneous cellular network (HCN) with imperfect channel state information (CSI), we proposed a coordinated multipoint (CoMP) transmission scheme based on dual-threshold optimization, in which only base stations (BSs) with good channel conditions are selected for transmission. First, we present a candidate BSs formation policy to increase access efficiency, which provides a candidate region of serving BSs. Then, we design a CoMP networking strategy to select serving BSs from the set of candidate BSs, which degrades the influence of channel estimation errors and guarantees qualities of communication links. Finally, we analyze the performance of the proposed scheme, and present a dual-threshold optimization model to further support the performance. Numerical results are presented to verify our theoretical analysis, which draw a conclusion that the CoMP transmission scheme can ensure reliable and secure communication in dense HCNs with imperfect CSI.

Proxy-AAA Authentication Scheme with Forwarding Mode Supporting in PMIPv6 Networks

  • Han, JeongBae;Jeong, Jongpil;Jo, Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.18-22
    • /
    • 2013
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

APPLICATION OF THE BIFOCUSING METHOD IN MICROWAVE IMAGING WITHOUT BACKGROUND INFORMATION

  • SEONG-HO SON;WON-KWANG PARK
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.27 no.2
    • /
    • pp.109-122
    • /
    • 2023
  • In this study, we consider the application of the bifocusing method (BFM) for identifying the locations and shapes of small anomalies from scattering parameter data when the exact values of background permittivity and conductivity are unknown. To this end, an imaging function using numerical focusing operator is introduced and its mathematical structure is revealed by establishing a relationship with an infinite series of Bessel functions, antenna arrangements, and anomaly properties. On the basis of the revealed structure, we demonstrate why inaccurate location and size of anomalies were retrieved via the BFM. Some simulation results are illustrated using synthetic data polluted by random noise to support the theoretical result.